Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


f 


MEDIDNA.001C1 

Applicant 
Appl. No. 
Filed 
For 


PATENT 


yi 


IN THE UNITED STATES PATENT AND TRADEMARK OFFICE 


Examiner 


Benson et al. 
Herewith 

METHOD AND SYSTEM FOR 
MANAGING A DATA 
OBJECT SO AS TO COMPLY 
WITH PREDETERMINED 
CONDITIONS FOR USAGE 

Unassigned 


Group Art Unit Unassigned 


PRELIMINARY AMENDMENT 

Assistant Commissioner for Patents 
Washington, D.C. 20231 

Dear Sir: 

Prior to an examination on the merits, please enter the amendments below. 


'■ii 

03 


IN THF CLAIMS: 

Please cancel Clai 



ithout disclaimer or prejudice. 
Please add the following new Claims 30-69 as follows: 

55. A method of managing a data object so as to comply with control conditions for 
usage of the data object, comprising: 

providing a variable number of control conditions for usage of the data object; 
providing a general set of control data for the data object based on the variable 
number of control conditions for usage, the general set of control data comprising at least 
one or more usage control elements defining usages of the data object which comply with 
the variable number of control conditions; 

combining the general set of control data with the data object; and 


-1- 


Appl. No. Unas^^d 
Filed : Herewitn 

encrypting the data object and the one or more usage control elements to create a 
secure data package. 

** yt. The method of Claim JK), additionally comprising encrypting together the data 
object and the general set of control data. 

i 

3 The method of Claim ^0, wherein providing the general set of control data 

includes providing an identifier which uniquely identifies the general set of control data. 

The method of Claim ^0; wherein providing the general set of control data 
includes providing a security control element which identifies a security process to be applied 
before usage of the data object is allowed. 

The method of Claim 30> wherein providing the general set of control data 
includes providing a format control element which identifies the format of the control data. 

u £5. The method of Claim ^0; additionally comprising: 

receiving a request for authorization for usage by a user; 

comparing the usage for which authorization is requested with the one or more 
usage control elements of the general set of control data; and 

granting the authorization if the usage for which authorization is requested 
complies with the usages defined by the one or more usage control elements. 

■* ^ 

36. The method of Claim 3^ additionally comprising requiring payment for the 
requested authorization for usage before granting the authorization. 

4 x 1 

" Yl. The method of Claim additionally comprising: 

transmitting the secure data package into a data processor; 


Appl. No. Unas^^d 

Filed : Herewith 

checking, in response to a request by a user for usage of the data object, whether 
the requested usage complies with the usage defined by the at least one usage control 
element of the general set of control data; and 

decrypting, in response to the requested usage complying with the usage defined 
by the at least one usage control element of the general set of control data, the data object 
so as to enable the requested usage. 

* y(. The method of Claim yf 9 additionally comprising: 

combining, after the usage of the data object, the data object and the one or more 
usage control elements; and 

reencrypting at least the data object and the one or more usage control elements. 

A method of controlling the usage by a user of a data object so as to comply with 
control conditions for usage of the data object, comprising: 

providing a variable number of control conditions for usage of the data object; 

providing a data package comprising a data object and control data, which 
comprises at least one usage control element defining a usage of the data object which 
complies with the variable number of control conditions, the data object and the at least 
one usage control element being encrypted; 

receiving a request by the user for usage of the data object; 

decrypting the control data; 

checking, in response to the request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the control data; and 

decrypting, in response to the requested usage complying with the usage defined 
by the at least one usage control element of the control data, the data object and enabling 
the requested usage. 

li l ° 
40. The method of Claim 30, wherein the usage control element is updated after the at 

least one usage of the data object. 


-3- 


Appl. No. 
Filed 


Unas.^^d 

Herewith 


* pf. The method of Claim )B, wherein the control data comprises an indication of the 
number of times the user is authorized to use the data object in accordance with the at least one 
usage control element, wherein the requested usage of the data object is only enabled when the 
number of times is one or more, and wherein the number of times is decremented by one when 
the requested usage is enabled. 

I ^2. The method of Claim ^9, wherein the control data comprise a security control 
element, and additionally comprising executing, before each usage of the data object, a security 
procedure defined in the security control element. 

\ #5. The method of Claim wherein checking whether the requested usage complies 

with the usage defined by the at least one usage control element, comprises checking that a data 
processor is capable of executing a security procedure specified in a security control element of 
the at least one usage control element, and if not, disabling the usage. 

#4. The method of Claim additionally comprising: 

combining, after the usage of the data object, the data object and the one or more 
usage control elements; and 

reencrypting at least the data object and the one or more usage control elements. 

1 A system for managing a data object so as to comply with control conditions for 

usage of the data object, comprising: 

a user interface module which receives a variable number of control conditions; 
a packaging module which provides a general set of control data for the data 
object based on the variable number of control conditions for usage, the general set of 
control data comprising at least one or more usage control elements defining usages of 
the data object which comply with the variable number of control conditions and which 
combines the general set of control data with the data object; and 


Appl. No. Unas^pd 

Filed : Herewith 

an encrypting module which encrypts the data object and at least the one or more 
usage control elements to create a secure data package necessary. 

}6. The system of Claim 4£ wherein the general set of control data comprises a 
control data element which controls further distribution of the data object. 

ff. The system of Claim 4£ wherein one of the usage control elements includes a 
security control element that defines a security procedure. 

fl. The system for controlling the usage by a user of a data object so as to comply 
with control conditions for usage of the data object, comprising: 

a usage manager module which receives a variable number of control conditions, 
checks whether a usage requested by the user complies with the usage defined by at least 
one usage control element that complies with the variable number of control conditions, 
and disables the usage requested by the user when the usage does not comply with the 
usage defined by the at least one usage control element; and 

a decryption module which decrypts the at least one usage control element and the 
data object 


4°. 


4$. The system of Claim 4£ wherein one of the usage control elements includes 
security control element that defines a security procedure. 


50. The system of Claim 4£ wherein the security procedure is an RSA encryption 
algorithm. 

54. The system of Claim 4%, wherein the usage manager module repackages the data 
object after usage. 

52. A method of controlling the usage by a user of data objects so as to comply with a 
variable number of conditions for usage of the data objects, comprising: 


-5- 


Appl. No. Unas^^d 
Filed : Herewith 

providing at least two data packages, each data package comprising a data object 
and a user set of control data, which comprises at least one usage control element 
defining a usage of the data object which complies with the variable number of 
conditions, the data object and the at least one usage control elements being encrypted; 
decrypting the usage control elements of the user sets of control data; 
examining the usage control elements of the at least two data packages to find a 
match; and 

performing an action being specified in the user sets of control data of the at least 
two data packages. 

53. The method of Claim &, wherein one of the at least two data packages is a sell 
order, and wherein one of the at least two data packages is a buy order. 

54. The method of Claim ft additionally comprising checking whether a data 
processor is capable of executing a security procedure specified in a security control element of 
the at least one usage control element, and disabling the usage when the data processor is not 
capable of executing the security procedure. 

^ . The method of Claim 52, additionally comprising: 

updating the at least one usage control element of each data package; 
combining after the usage of the data objects, each of the data objects and its at 
least one usage control element; 

reencrypting each of the combined data objects and its at least one usage control 
element; and 

transferring the repackaged data objects to their providers. 

56. A method of managing a data object so as to comply with a variable number of 
ontrol conditions for usage of the data object, comprising: 

providing variable control conditions for usage of the data object; 


AppLNo. Unas^pW 
Filed : Herewith 

providing a general set of control data for the data object based on the variable 
control conditions for usage, the general set of control data comprising at least one or 
more usage control elements defining usages of the data object which comply with the 
variable control conditions; 

providing, in response to a request for authorization for usage of the data object 
by a user, a user set of control data, which comprises at least a subset of the general set of 
control data, including at least one of the usage control elements; 

combining the user set of control data with the data object; 

encrypting at least the data object and the at least one of the usage control 
elements of the user set of control data to create a secure data package; and 

checking, before allowing transfer of the data package to the user, that the request 
for authorization for usage of the data object has been granted. 

yf. The method of Claim additionally comprising checking whether a data 
processor is capable of executing a security procedure specified in a security control element of 
the at least one usage control element, and disabling the usage when the data processor is not 
capable of executing the security procedure. 

ft & 
p4. The method of Claim 5<£ wherein the data object is composed of at least two 

constituent data objects and wherein the user set of control data, in response to a request for 

authorization for usage of one of the constituent data objects by a user, is created only for that 

constituent data object and combined only with a copy of that constituent data object. 

«- £9. The method of Claim 5#, wherein the request for authorization is received from a 
user via a data network. 

The method of Claim wherein the data object is a composite data object 
including at least two constituent data objects, and wherein providing a general set of control 
data comprises providing a respective general set of control data for each of the constituent data 
objects and the composite data object, and wherein providing a user set of control data comprises 


Appl. No. Unas^^d 
Filed : Herewith 

providing a respective user set of control data for each of the constituent data objects and the 
composite data object 

p. The method as defined in Claim 5< additionally comprising storing the user set of 
control data in a processor of a data object provider. 

2>^£ The method as defined in Claim $6, additionally comprising: 
transmitting the data package; 

decrypting the at least one usage control element of the user set of control data; 
checking, in response to a request by the user for usage of the data object, whether 
the requested usage complies with the usage defined by the at least one usage control 
element of the user set of control data; and 

decrypting, in response to the requested usage complying with the usage defined 
by the at least one usage control element of the user set of control data, the data object 
and enabling the requested usage. 

$ ■ I* 

u 03. The method of Claim 5£ additionally comprising: 

transmitting the data package; 

decrypting the at least one usage control element of the user set of control data; 

checking, in response to a request by the user for usage of the data object, whether 
the requested usage complies with the usage defined by the at least one usage control 
element of the user set of control data; 

decrypting, in response to the requested usage complying with the usage defined 
by the at least one usage control element of the user set of control data, the data object 
and enabling the requested usage; and 

combining, after the usage of the data object, the data object and the one or more 
usage control elements of the user set of control data, and combining at least the data 
object and the one or more usage of the user set of control data. 

- A system for managing a data object so as to comply with control conditions for 

usage of the data object, comprising: 

-8- 


Appl. No. Unas^^d 

Filed : Herewith 

a packaging module which provides a general set of control data for the data 
object based on variable conditions for usage, the general set of control data comprising 
at least one or more usage control elements defining usages of the data object which 
comply with the variable conditions and which combines the user set of control data with 
the data object, and wherein the packaging module provides in response to a request for 
authorization for usage of the data object by a user, a user set of control data, which 
comprises at least a subset of the general set of control data, which subset comprises at 
least one of the usage control elements; 

an encrypting module which encrypts the data object and at least the one or more 
usage control elements of the user set of control data to create a secure data package, 
which is ready for transfer to a user; and 

a control module which checks that the request for authorization for usage of the 
data object has been granted before allowing transfer of the data package to the user. 

A method of managing a data object so as to comply with control conditions for 
usage of the data object, comprising: 

providing a general set of control data for the data object based on a variable 
number of control conditions for usage, the general set of control data comprising at least 
one or more usage control elements defining usages of the data object which comply with 
the variable number of control conditions; and 

encrypting the data object and the one or more usage control elements to create at 
least one secure data package. 

The method of Claim 0, wherein the data object and the usage control elements 
are each encrypted into separate secure packages. 

0. The method of Claim $5 y wherein providing the general set of control data 
includes providing a security control element which identifies a security process to be applied 
before usage of the data object is allowed. 


-9- 


Appl. No. 
Filed 


nas^^bd 


Una 

Herewith 



'TO 

7\ p8. The method of Claim wherein providing the general set of control data 
includes providing a format control element which identifies the format of the control data. 

T° 09. The method of Claim fg, additionally comprising: 
/ receiving a request for authorization for usage by a user; 

comparing the usage for which authorization is requested with the one or more 
usage control elements of the general set of control data; and 

granting the authorization if the usage for which authorization is requested 
complies with the usages defined by the one or more usage control elements 


Respectfully 


kno: 


TENS, OLSON & BEAR, LLP 


li 
Qi 


Dated: 


\o A /?g 


By: 



John M.ljCarson 
Registration No. 34,303 
Attorney of Record 
620 Newport Center Drive 
Sixteenth Floor 
Newport Beach, CA 92660 
(619) 235-8550 


S:\DOCS\EMN\EMN-l 526JX)Okz9 
060198 


-10-